• Title/Summary/Keyword: Laptop Computer

Search Result 91, Processing Time 0.036 seconds

An Exploratory Study of the Relationship between Smart Learning and Smart Work: The Use of Personal Laptops by Graduate Students in a Smart Campus Environment (스마트러닝과 스마트워크의 관련성에 대한 탐색적 연구: 스마트 캠퍼스 환경에서 대학원생의 개인 노트북 컴퓨터 사용을 중심으로)

  • Kim, Young-Woo
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.27-35
    • /
    • 2012
  • The importance of smart learning (SL) has been emphasized in schools. Additionally, the significance of smart work (SW) in improving business performance has gained much attention among industries. From theoretical, technological, and environmental perspectives, SL and SW are somewhat similar. Therefore, a case study was performed to find a way to link SL and SW, and a linking model was proposed for this purpose. Because laptops are considered a pivotal element in the technological aspect of SL, graduate students' use of personal laptops in classes (Bring Your Own Laptop, BYOL) was investigated. The results showed that the students reacted positively to the idea of using personal laptops in class and that they expected to learn IT skills more effectively this way. They listed being able to study even after class and the easy accessibility of relevant data as the strengths of BYOL. However, they cited the heaviness of the laptops and occasional loss of focus during classes as the weaknesses of BYOL. Thus, this study showed the possibility of that students who experience SL can perform better in an SW situation. Therefore, if a policy is enacted that allows students to efficiently use laptops, a greater number of educational achievements will be attained on smart campuses and, subsequently, a greater number of smart workers will be produced.

Magnetic Resonant Wireless Power Transfer Using Reconfigurable Slit Ground Resonator for Laptop Computer (재구성 슬릿 그라운드 공진기를 이용한 노트북용 자기공진형 무선전력전송)

  • Kang, Seok Hyon;Jung, Chang Won
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.1
    • /
    • pp.69-75
    • /
    • 2017
  • In this paper, slit ground resonator with slit and capacitor is proposed for practical use of magnetic resonant wireless power transfer(MR-WPT). And this paper presents the performance comparison of conventional loop resonator as Rx resonator to slit ground resonator. The proposed silt ground resonator with 31 cm width, 20.5 cm length, $35{\mu}m$ thickness is designed the crossing slit 1 cm width with only opened edge. And an external capacitors were connected at the opened edge of slit ground resonator for resonating at 6.78 MHz. The transfer efficiencies of MR-WPT were measured at open and short mode, and then the highest transfer efficiencies of MR-WPT according to the Rx resonators were plotted. In result, the transfer efficiency of MR-WPT with loop resonator was the highest. However, when the ground was inserted in receiver part at the bottom of laptop model, the transfer efficiency was closed 0 %. The transfer efficiency recovered the transfer efficiency of 67 % using slit ground resonator. The magnetic field was penetrated through the slit and proposed slit ground resonator works as resonator in MR-WPT.

A Study on Parallel AES Cipher Algorithm based on Multi Processor (멀티프로세서 기반의 병렬 AES 암호 알고리즘에 관한 연구)

  • Park, Jung-Oh;Oh, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.171-181
    • /
    • 2012
  • This paper defines the AES password algorithm used as a symmetric-key-based password algorithm, and proposes the design of parallel password algorithm to utilize the resources of multi-core processor as much as possible. The proposed parallel password algorithm was confirmed for parallel execution of password computation by allocating the password algorithm according to the number of cores, and about 30% of performance increase compared to AES password algorithm. The encryption/decryption performance of the password algorithm was confirmed through binary comparative analysis tool, which confirmed that the binary results were the same for AES password algorithm and proposed parallel password algorithm, and the decrypted binary were also the same. The parallel password algorithm for multi-core environment proposed in this paper can be applied to authentication/payment of financial service in PC, laptop, server, and mobile environment, and can be utilized in the area that required high-speed encryption operation of large-sized data.

Cloud Computing-Based Processing of Large Volume UAV Images Acquired in Disaster Sites (재해/재난 현장에서 취득한 대용량 무인기 영상의 클라우드 컴퓨팅 기반 처리)

  • Han, Soohee
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_3
    • /
    • pp.1027-1036
    • /
    • 2020
  • In this study, a cloud-based processing method using Agisoft Metashape, a commercial software, and Amazon web service, a cloud computing service, is introduced and evaluated to quickly generate high-precision 3D realistic data from large volume UAV images acquired in disaster sites. Compared with on-premises method using a local computer and cloud services provided by Agisoft and Pix4D, the processes of aerial triangulation, 3D point cloud and DSM generation, mesh and texture generation, ortho-mosaic image production recorded similar time duration. The cloud method required uploading and downloading time for large volume data, but it showed a clear advantage that in situ processing was practically possible. In both the on-premises and cloud methods, there is a difference in processing time depending on the performance of the CPU and GPU, but notso much asin a performance benchmark. However, it wasfound that a laptop computer equipped with a low-performance GPU takes too much time to apply to in situ processing.

An Implementation of Context-Awareness Support System based on Voice Service for Medical Environments (의료 환경을 위한 음성 서비스 기반의 상황인식 지원 시스템의 구현)

  • Shim, Choon-Bo;Shin, Yang-Won;Park, Byung-Rae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.29-36
    • /
    • 2005
  • As computing environments are more rapidly developed, an adaptive and intelligent services using post PC such as PDA. Laptop, and Tablet PC in case of rounding and examining patients are highly demanded. The objective of this study is to design and implement a context-awareness support system based on voice service for medical environments. To achieve it, we propose a context middleware which plays an important role in recognizing a client with PDA by using a Bluetooth wireless communication technology as well as in executing an appropriate execution module, like delivery for diagnosis information of patients, according to the staff's context acquired from a context server. In addition, the context server functions as a manager that efficiently stores context information such as client's current status, physical environment, and device resources into a database server. Finally, for verifying the usefulness of the proposed system, we develop an application system which provides voice playing services for notification of other physicians through our context middleware.

  • PDF

Monitoring system for packet analysis on Wi-Fi environment (Wi-Fi 환경에서 패킷 분석을 위한 모니터링 시스템)

  • Seo, Hee-Suk;Kim, Hee-Wan;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.227-234
    • /
    • 2011
  • Many technologies for wireless internet are increasing as more and more laptop computers, net books, smart phone and other terminals, which provide wireless network, are created. IEEE 802.11 is computer wireless network technology that used in small area, called wireless LAN or Wi-Fi. IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). AP (Access Point) is installed at cafes and public places providing wireless environment. It is more convenient to use wireless internet, however, It can be seen easily around us and possible to communicate with AP. IEEE 802.11 has many vulnerability, such as packet manipulation and information disclosure, so we should pay more attention when using IEEE 802.11. Therefore this paper developing monitoring system which can find out AP and Stations that connect with it, and capturing AP's information to find out vulnerability. This paper suggests monitoring system which traffic analysis in wireless environment.

User-centered Design of m-Learning System: Moodle On The Go

  • Minovic, Miroslav;Stavljanin, Velimir;Milovanovic, Milos;Starcevic, Dusan
    • Journal of Computing Science and Engineering
    • /
    • v.4 no.1
    • /
    • pp.80-95
    • /
    • 2010
  • In order to truly integrate e-Learning system into regular curriculum at a university, mobile access to Learning Management Systems has to be enabled. Mobile devices have the potential to be integrated into the classroom, because they contain unique characteristics such as portability, social interactivity, context sensitivity, connectivity and individuality. Adoption of Learning Management Systems by students is still on the low rate, mostly because of poor usability of existing e-Learning systems. Our initial research has confirmed this hypothesis. Usability issue is rising to the higher level on the mobile platform, because of the mobile devices' limited screen size, input interfaces and bandwidth, and also because of the context of use. Our second hypothesis was that it is wrong to consider a mobile device as a surrogate for desktop or laptop personal computer (PC). By just adopting the existing Learning Management System on mobile devices with adaptive technologies such as Google proxy, we do not acquire the satisfactory results. Usability can prove to be even lower compared to desktop application. One possible solution to the problem could be development of rich client applications for today's mobile devices that would raise the usability to a higher level. We developed a PocketPC prototype application by using user-centered design principles, which we presented as a third alternative in usability research conducted among university students. Results gathered in such a way have confirmed that development of e-Learning system, in order to be widely accepted by students, needs to have the user(student) in the center of development process.

Visual spectral sensitivity of dark-adapted rockfish (Sebastes inermis) in LED light source (LED 광원에 대한 암순응시 볼락 (Sebastes inermis)의 시각 스펙트럼 민감도)

  • Heo, Min-A;Kang, Gyeong-Mi;Shin, Hyeon-Ok
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.51 no.1
    • /
    • pp.102-110
    • /
    • 2015
  • The characteristics of aquatic light fields are generally reflected in the visual systems of fishes inhabiting them. Therefore, research on light sensitivity of fish is useful to explain the correlation between the visual function and habitat, behavior and distribution of fish. Rockfish is an important species in coastal ecology and also one of the main species for culturing in Korea. To make a contribution on the maintenance of the fish resources and understanding the ecology of the rockfish, the visual spectral sensitivities of the dark-adapted rockfishes were measured in the range of visible light (405~660 nm) using a light source of light-emitting diodes (LEDs). In order to assess electrophysiological response of the fish, the ERGs (electroretinograms) of the dark-adapted rockfishes were recorded on a data logger (12 bits) and a laptop computer. Juvenile (n=5; weight: $20.3{\pm}5.2g$; total length: $10.3{\pm}0.7cm$) and adult (n=5; weight: $87.8{\pm}21.8g$; total length: $18.1{\pm}1.3cm$) rockfishes were used in experiment. The visual threshold of juvenile and adult rockfish were 11.66 (log quanta/$cm^2/s$) and 11.81 (log quanta/$cm^2/s$) in 574 nm, respectively. The peak wavelength of the spectral sensitivity in the dark-adapted juvenile and adult rockfish was commonly 551 nm (series of green color). Collectively, these results demonstrate that the rockfish has suitable visual capabilities for inhabiting coastal water in Korea.

An Interactive Monitoring Application for Secure Experiments of Guidance System for Person with Visual Impairment (시각장애인 보행지원 시스템의 안전한 실험을 위한 대화식 모니터링 어플리케이션)

  • Lee, Jin-Hee;Lee, Eun-Seok;Shin, Byeong-Seok
    • Journal of the HCI Society of Korea
    • /
    • v.8 no.2
    • /
    • pp.1-8
    • /
    • 2013
  • In previous study, we developed a guidance system outdoors for person with visual impairment to be able to walk safely to the destination. The volunteers are exposed to dangerous situations since they are performed to the experiments in the outdoors. In order to solve the problem, we propose an interactive application that monitors the volunteer wearing guidance system and warns remotely the volunteer about dangerous situations. The application is used to remote wireless communication with guidance system through Bluetooth module that is built in a laptop computer, without additional device. Therefore, we can monitor in real time user's location and guided contents to user, and it is possible to check a path to the destination and POI (Point of Interest) coordinate values. As using a proposed monitoring application, it is possible to perform safe experiment with the rapid situation awareness and fast detection of dangerous.

  • PDF

Provisioning QoS for WiFi-enabled Portable Devices in Home Networks

  • Park, Eun-Chan;Kwak, No-Jun;Lee, Suk-Kyu;Kim, Jong-Kook;Kim, Hwang-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.4
    • /
    • pp.720-740
    • /
    • 2011
  • Wi-Fi-enabled portable devices have recently been introduced into the consumer electronics market. These devices download or upload content, from or to a host machine, such as a personal computer, a laptop, a home gateway, or a media server. This paper investigates the fairness among multiple Wi-Fi-enabled portable devices in a home network when they are simultaneously communicated with the host machine. First, we present that, a simple IEEE 802.11-based home network suffers from unfairness, and the fairness is exaggerated by the wireless link errors. This unfairness is due to the asymmetric response of the TCP to data-packet loss and to acknowledgment-packet loss, and the wireless link errors that occur in the proximity of any node; the errors affect other wireless devices through the interaction at the interface queue of the home gateway. We propose a QoS-provisioning framework in order to achieve per-device fairness and service differentiation. For this purpose, we introduce the medium access price, which denotes an aggregate value of network-wide traffic load, per-device link usage, and per-device link error rate. We implemented the proposed framework in the ns-2 simulator, and carried out a simulation study to evaluate its performance with respect to fairness, service differentiation, loss and delay. The simulation results indicate that the proposed method enforces the per-device fairness, regardless of the number of devices present and regardless of the level of wireless link errors; furthermore it achieves high link utilization with only a small amount of frame losses.